summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2001-10-31 11:09:21 +0000
committerAndrew Bartlett <abartlet@samba.org>2001-10-31 11:09:21 +0000
commitb49b7ed1fb6b63d40f6b2aa62f6c8b787a498419 (patch)
tree6073ae5244f3ffa50c194d23be6d83425bc7e9c5
parent60f0627afb167faad57385d44f0b587186a7ac2b (diff)
downloadsamba-b49b7ed1fb6b63d40f6b2aa62f6c8b787a498419.tar.gz
samba-b49b7ed1fb6b63d40f6b2aa62f6c8b787a498419.tar.bz2
samba-b49b7ed1fb6b63d40f6b2aa62f6c8b787a498419.zip
Small changes for guest authenticated pipes.
(This used to be commit 813bf962ae6f29ddcaee4bc8b67d8017f04172b1)
-rw-r--r--source3/rpc_server/srv_pipe.c15
1 files changed, 7 insertions, 8 deletions
diff --git a/source3/rpc_server/srv_pipe.c b/source3/rpc_server/srv_pipe.c
index 21de4d3d2b..852dd7de26 100644
--- a/source3/rpc_server/srv_pipe.c
+++ b/source3/rpc_server/srv_pipe.c
@@ -273,8 +273,8 @@ static BOOL api_pipe_ntlmssp_verify(pipes_struct *p, RPC_AUTH_NTLMSSP_RESP *ntlm
const uchar *smb_passwd_ptr = NULL;
- auth_usersupplied_info *user_info;
- auth_serversupplied_info *server_info;
+ auth_usersupplied_info *user_info = NULL;
+ auth_serversupplied_info *server_info = NULL;
uid_t *puid;
uid_t *pgid;
@@ -295,8 +295,6 @@ static BOOL api_pipe_ntlmssp_verify(pipes_struct *p, RPC_AUTH_NTLMSSP_RESP *ntlm
* Setup an empty password for a guest user.
*/
- memset(null_smb_passwd,0,16);
-
/*
* We always negotiate UNICODE.
*/
@@ -338,8 +336,6 @@ static BOOL api_pipe_ntlmssp_verify(pipes_struct *p, RPC_AUTH_NTLMSSP_RESP *ntlm
fstrcpy(pipe_user_name, lp_guestaccount(-1));
DEBUG(100,("Null user in NTLMSSP verification. Using guest = %s\n", pipe_user_name));
- smb_passwd_ptr = null_smb_passwd;
-
} else {
/*
@@ -382,6 +378,9 @@ failed authentication on named pipe %s.\n", domain, pipe_user_name, wks, p->name
free_server_info(&server_info);
return False;
}
+ } else {
+ /* This includes a NULLed out first_8_lm_hash */
+ make_server_info_guest(&server_info);
}
/*
@@ -450,8 +449,8 @@ failed authentication on named pipe %s.\n", domain, pipe_user_name, wks, p->name
/* Create an NT_USER_TOKEN struct for this user. */
p->pipe_user.nt_user_token = create_nt_token(p->pipe_user.uid,p->pipe_user.gid,
- p->pipe_user.ngroups, p->pipe_user.groups,
- guest_user);
+ p->pipe_user.ngroups, p->pipe_user.groups,
+ guest_user);
p->ntlmssp_auth_validated = True;